Sciweavers

71 search results - page 3 / 15
» kes 2005
Sort
View
KES
2005
Springer
13 years 10 months ago
Annealing Sensor Networks
With a continuing improvement in the capabilities of intelligence per unit of energy, we should reconsider the organisation of sensor networks. We contend that solutions should be ...
Andrew Jennings, Daud Channa
KES
2005
Springer
13 years 10 months ago
Weak Key Analysis and Micro-controller Implementation of CA Stream Ciphers
Abstract. In the paper we extend known results studying the application of CAs for stream ciphers. We illustrate the notion of weak keys in such a cryptosystem and describe the exp...
Pascal Bouvry, Gilbert Klein, Franciszek Seredynsk...
KES
2005
Springer
13 years 10 months ago
Uncertainty Management in Logic Programming: Simple and Effective Top-Down Query Answering
We present a simple, yet general top-down query answering procedure for logic programs managing uncertainty. The main features are: (i) the certainty values are taken from a certai...
Umberto Straccia
KES
2005
Springer
13 years 10 months ago
Modeling the Discovery of Critical Utterances
The ubiquity of chance discovery can be seen in many areas of application, fundamentally when there are events that are difficult to find or predict. In this paper, we present our...
Calkin A. S. Montero, Yukio Ohsawa, Kenji Araki